山间窄路 发表于 2025-3-28 15:22:35

http://reply.papertrans.cn/33/3202/320164/320164_41.png

FICE 发表于 2025-3-28 19:24:01

https://doi.org/10.1007/978-1-4612-4226-0ve not yet been studied sufficiently. In this paper, we analyze the security of SCHs focusing on the stream cipher function. First, we propose a model of SCHs which consist of a pre-computation function and a stream cipher. Then, we show that attacks against a stream cipher can also be threats to SC

Legend 发表于 2025-3-28 23:52:18

http://reply.papertrans.cn/33/3202/320164/320164_43.png

Oratory 发表于 2025-3-29 03:06:03

http://reply.papertrans.cn/33/3202/320164/320164_44.png

惰性女人 发表于 2025-3-29 09:30:03

https://doi.org/10.1007/978-3-642-25206-8context-aware computing; elliptic curve cryptography; middleware; quality of services; social network se

Blemish 发表于 2025-3-29 12:04:32

http://reply.papertrans.cn/33/3202/320164/320164_46.png

MARS 发表于 2025-3-29 16:16:26

Communications in Computer and Information Sciencehttp://image.papertrans.cn/f/image/320164.jpg

Herpetologist 发表于 2025-3-29 21:53:06

978-3-642-25205-1Springer-Verlag GmbH Berlin Heidelberg 2012

RADE 发表于 2025-3-30 02:17:04

http://reply.papertrans.cn/33/3202/320164/320164_49.png

安装 发表于 2025-3-30 07:29:18

e-Business Challenges and Directions: Important Themes from the First ICE-B Workshopsiness challenges and directions across four subject areas: a) e-Business applications and models, b) enterprise engineering, c) mobility, d) business collaboration and e-Services, and e) technology platforms. Quality Function Deployment (QFD) methods were used to gather, organize and evaluate theme
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: e-Business and Telecommunications; 7th International Jo Mohammad S. Obaidat,George A. Tsihrintzis,Joaquim Conference proceedings 2012 Spri